Distance-bounding protocol with time-stamped authentication for RFID

被引:0
|
作者
Wei Guo-heng [1 ]
Zhang Huan-guo [1 ]
Li Zheng [2 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei, Peoples R China
[2] Naval Univ Engn, Informat Secur Dept, Wuhan 430033, Hubei, Peoples R China
关键词
Radio Frequency Identification (RFID); distance-bounding protocol; relay attack;
D O I
10.1109/3PGCIC.2014.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relay attack is one of the most challenging threats that RFID will have to face now. Distance bounding protocols form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase that have been introduced to thwart relay attacks. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We provide an effective attack of a family of such protocols to implement the spoofing attacks of distance successfully, and description of existing protocols cannot completely eliminate such attacks. Corresponding we propose a new time-stamped program to correct the defect and verify the effectiveness.
引用
收藏
页码:139 / 145
页数:7
相关论文
共 50 条
  • [31] A new secure authentication based distance bounding protocol
    Sultan, Ahmed Raheeq
    Rashid, Imran
    Khan, Fawad
    Tahir, Shahzaib
    Pasha, Maruf
    Sultan, Aiman
    PEERJ COMPUTER SCIENCE, 2021,
  • [32] Distance-bounding proof of knowledge to avoid real-time attacks
    Bussard, L
    Bagga, W
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 223 - 238
  • [33] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
  • [34] The Swiss-Knife RFID Distance Bounding Protocol
    Kim, Chong Hee
    Avoine, Gildas
    Koeune, Francois
    Standaert, Francois-Xavier
    Pereira, Olivier
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 98 - 115
  • [35] An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
    Avoine, Gildas
    Tchamkerten, Aslan
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 250 - +
  • [36] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
  • [37] Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols
    Rad, Azadeh Imani
    Alagheband, Mahdi R.
    Far, Saeed Banaeian
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 : 87 - 94
  • [38] Security of the design of time-stamped signatures
    Shao, ZH
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (04) : 690 - 705
  • [39] A Scalable, Correct Time-Stamped Stack
    Dodds, Mike
    Haas, Andreas
    Kirsch, Christoph M.
    ACM SIGPLAN NOTICES, 2015, 50 (01) : 233 - 246
  • [40] By using time-stamped transition density
    Choi, H
    Yi, JH
    Hwang, SH
    ISCAS '97 - PROCEEDINGS OF 1997 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I - IV: CIRCUITS AND SYSTEMS IN THE INFORMATION AGE, 1997, : 1528 - 1531